1 /* SPDX-License-Identifier: GPL-2.0 */ 2 3 #define COMMON_FILE_SOCK_PERMS \ 4 "ioctl", "read", "write", "create", "getattr", "setattr", "lock", \ 5 "relabelfrom", "relabelto", "append", "map" 6 7 #define COMMON_FILE_PERMS \ 8 COMMON_FILE_SOCK_PERMS, "unlink", "link", "rename", "execute", \ 9 "quotaon", "mounton", "audit_access", "open", "execmod", \ 10 "watch", "watch_mount", "watch_sb", "watch_with_perm", \ 11 "watch_reads" 12 13 #define COMMON_SOCK_PERMS \ 14 COMMON_FILE_SOCK_PERMS, "bind", "connect", "listen", "accept", \ 15 "getopt", "setopt", "shutdown", "recvfrom", "sendto", \ 16 "name_bind" 17 18 #define COMMON_IPC_PERMS \ 19 "create", "destroy", "getattr", "setattr", "read", "write", \ 20 "associate", "unix_read", "unix_write" 21 22 #define COMMON_CAP_PERMS \ 23 "chown", "dac_override", "dac_read_search", "fowner", "fsetid", \ 24 "kill", "setgid", "setuid", "setpcap", "linux_immutable", \ 25 "net_bind_service", "net_broadcast", "net_admin", "net_raw", \ 26 "ipc_lock", "ipc_owner", "sys_module", "sys_rawio", \ 27 "sys_chroot", "sys_ptrace", "sys_pacct", "sys_admin", \ 28 "sys_boot", "sys_nice", "sys_resource", "sys_time", \ 29 "sys_tty_config", "mknod", "lease", "audit_write", \ 30 "audit_control", "setfcap" 31 32 #define COMMON_CAP2_PERMS \ 33 "mac_override", "mac_admin", "syslog", "wake_alarm", "block_suspend", \ 34 "audit_read", "perfmon", "bpf", "checkpoint_restore" 35 36 #ifdef __KERNEL__ /* avoid this check when building host programs */ 37 #include <linux/capability.h> 38 39 #if CAP_LAST_CAP > CAP_CHECKPOINT_RESTORE 40 #error New capability defined, please update COMMON_CAP2_PERMS. 41 #endif 42 #endif 43 44 /* 45 * Note: The name for any socket class should be suffixed by "socket", 46 * and doesn't contain more than one substr of "socket". 47 */ 48 const struct security_class_mapping secclass_map[] = { 49 { "security", 50 { "compute_av", "compute_create", "compute_member", "check_context", 51 "load_policy", "compute_relabel", "compute_user", "setenforce", 52 "setbool", "setsecparam", "setcheckreqprot", "read_policy", 53 "validate_trans", NULL } }, 54 { "process", 55 { "fork", "transition", "sigchld", "sigkill", 56 "sigstop", "signull", "signal", "ptrace", 57 "getsched", "setsched", "getsession", "getpgid", 58 "setpgid", "getcap", "setcap", "share", 59 "getattr", "setexec", "setfscreate", "noatsecure", 60 "siginh", "setrlimit", "rlimitinh", "dyntransition", 61 "setcurrent", "execmem", "execstack", "execheap", 62 "setkeycreate", "setsockcreate", "getrlimit", NULL } }, 63 { "process2", { "nnp_transition", "nosuid_transition", NULL } }, 64 { "system", 65 { "ipc_info", "syslog_read", "syslog_mod", "syslog_console", 66 "module_request", "module_load", NULL } }, 67 { "capability", { COMMON_CAP_PERMS, NULL } }, 68 { "filesystem", 69 { "mount", "remount", "unmount", "getattr", "relabelfrom", 70 "relabelto", "associate", "quotamod", "quotaget", "watch", NULL } }, 71 { "file", 72 { COMMON_FILE_PERMS, "execute_no_trans", "entrypoint", NULL } }, 73 { "dir", 74 { COMMON_FILE_PERMS, "add_name", "remove_name", "reparent", "search", 75 "rmdir", NULL } }, 76 { "fd", { "use", NULL } }, 77 { "lnk_file", { COMMON_FILE_PERMS, NULL } }, 78 { "chr_file", { COMMON_FILE_PERMS, NULL } }, 79 { "blk_file", { COMMON_FILE_PERMS, NULL } }, 80 { "sock_file", { COMMON_FILE_PERMS, NULL } }, 81 { "fifo_file", { COMMON_FILE_PERMS, NULL } }, 82 { "socket", { COMMON_SOCK_PERMS, NULL } }, 83 { "tcp_socket", 84 { COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } }, 85 { "udp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } }, 86 { "rawip_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } }, 87 { "node", { "recvfrom", "sendto", NULL } }, 88 { "netif", { "ingress", "egress", NULL } }, 89 { "netlink_socket", { COMMON_SOCK_PERMS, NULL } }, 90 { "packet_socket", { COMMON_SOCK_PERMS, NULL } }, 91 { "key_socket", { COMMON_SOCK_PERMS, NULL } }, 92 { "unix_stream_socket", { COMMON_SOCK_PERMS, "connectto", NULL } }, 93 { "unix_dgram_socket", { COMMON_SOCK_PERMS, NULL } }, 94 { "sem", { COMMON_IPC_PERMS, NULL } }, 95 { "msg", { "send", "receive", NULL } }, 96 { "msgq", { COMMON_IPC_PERMS, "enqueue", NULL } }, 97 { "shm", { COMMON_IPC_PERMS, "lock", NULL } }, 98 { "ipc", { COMMON_IPC_PERMS, NULL } }, 99 { "netlink_route_socket", 100 { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } }, 101 { "netlink_tcpdiag_socket", 102 { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } }, 103 { "netlink_nflog_socket", { COMMON_SOCK_PERMS, NULL } }, 104 { "netlink_xfrm_socket", 105 { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg", NULL } }, 106 { "netlink_selinux_socket", { COMMON_SOCK_PERMS, NULL } }, 107 { "netlink_iscsi_socket", { COMMON_SOCK_PERMS, NULL } }, 108 { "netlink_audit_socket", 109 { COMMON_SOCK_PERMS, "nlmsg_read", "nlmsg_write", "nlmsg_relay", 110 "nlmsg_readpriv", "nlmsg_tty_audit", "nlmsg", NULL } }, 111 { "netlink_fib_lookup_socket", { COMMON_SOCK_PERMS, NULL } }, 112 { "netlink_connector_socket", { COMMON_SOCK_PERMS, NULL } }, 113 { "netlink_netfilter_socket", { COMMON_SOCK_PERMS, NULL } }, 114 { "netlink_dnrt_socket", { COMMON_SOCK_PERMS, NULL } }, 115 { "association", 116 { "sendto", "recvfrom", "setcontext", "polmatch", NULL } }, 117 { "netlink_kobject_uevent_socket", { COMMON_SOCK_PERMS, NULL } }, 118 { "netlink_generic_socket", { COMMON_SOCK_PERMS, NULL } }, 119 { "netlink_scsitransport_socket", { COMMON_SOCK_PERMS, NULL } }, 120 { "netlink_rdma_socket", { COMMON_SOCK_PERMS, NULL } }, 121 { "netlink_crypto_socket", { COMMON_SOCK_PERMS, NULL } }, 122 { "appletalk_socket", { COMMON_SOCK_PERMS, NULL } }, 123 { "packet", 124 { "send", "recv", "relabelto", "forward_in", "forward_out", NULL } }, 125 { "key", 126 { "view", "read", "write", "search", "link", "setattr", "create", 127 NULL } }, 128 { "dccp_socket", 129 { COMMON_SOCK_PERMS, "node_bind", "name_connect", NULL } }, 130 { "memprotect", { "mmap_zero", NULL } }, 131 { "peer", { "recv", NULL } }, 132 { "capability2", { COMMON_CAP2_PERMS, NULL } }, 133 { "kernel_service", { "use_as_override", "create_files_as", NULL } }, 134 { "tun_socket", { COMMON_SOCK_PERMS, "attach_queue", NULL } }, 135 { "binder", 136 { "impersonate", "call", "set_context_mgr", "transfer", NULL } }, 137 { "cap_userns", { COMMON_CAP_PERMS, NULL } }, 138 { "cap2_userns", { COMMON_CAP2_PERMS, NULL } }, 139 { "sctp_socket", 140 { COMMON_SOCK_PERMS, "node_bind", "name_connect", "association", 141 NULL } }, 142 { "icmp_socket", { COMMON_SOCK_PERMS, "node_bind", NULL } }, 143 { "ax25_socket", { COMMON_SOCK_PERMS, NULL } }, 144 { "ipx_socket", { COMMON_SOCK_PERMS, NULL } }, 145 { "netrom_socket", { COMMON_SOCK_PERMS, NULL } }, 146 { "atmpvc_socket", { COMMON_SOCK_PERMS, NULL } }, 147 { "x25_socket", { COMMON_SOCK_PERMS, NULL } }, 148 { "rose_socket", { COMMON_SOCK_PERMS, NULL } }, 149 { "decnet_socket", { COMMON_SOCK_PERMS, NULL } }, 150 { "atmsvc_socket", { COMMON_SOCK_PERMS, NULL } }, 151 { "rds_socket", { COMMON_SOCK_PERMS, NULL } }, 152 { "irda_socket", { COMMON_SOCK_PERMS, NULL } }, 153 { "pppox_socket", { COMMON_SOCK_PERMS, NULL } }, 154 { "llc_socket", { COMMON_SOCK_PERMS, NULL } }, 155 { "can_socket", { COMMON_SOCK_PERMS, NULL } }, 156 { "tipc_socket", { COMMON_SOCK_PERMS, NULL } }, 157 { "bluetooth_socket", { COMMON_SOCK_PERMS, NULL } }, 158 { "iucv_socket", { COMMON_SOCK_PERMS, NULL } }, 159 { "rxrpc_socket", { COMMON_SOCK_PERMS, NULL } }, 160 { "isdn_socket", { COMMON_SOCK_PERMS, NULL } }, 161 { "phonet_socket", { COMMON_SOCK_PERMS, NULL } }, 162 { "ieee802154_socket", { COMMON_SOCK_PERMS, NULL } }, 163 { "caif_socket", { COMMON_SOCK_PERMS, NULL } }, 164 { "alg_socket", { COMMON_SOCK_PERMS, NULL } }, 165 { "nfc_socket", { COMMON_SOCK_PERMS, NULL } }, 166 { "vsock_socket", { COMMON_SOCK_PERMS, NULL } }, 167 { "kcm_socket", { COMMON_SOCK_PERMS, NULL } }, 168 { "qipcrtr_socket", { COMMON_SOCK_PERMS, NULL } }, 169 { "smc_socket", { COMMON_SOCK_PERMS, NULL } }, 170 { "infiniband_pkey", { "access", NULL } }, 171 { "infiniband_endport", { "manage_subnet", NULL } }, 172 { "bpf", 173 { "map_create", "map_read", "map_write", "prog_load", "prog_run", 174 NULL } }, 175 { "xdp_socket", { COMMON_SOCK_PERMS, NULL } }, 176 { "mctp_socket", { COMMON_SOCK_PERMS, NULL } }, 177 { "perf_event", 178 { "open", "cpu", "kernel", "tracepoint", "read", "write", NULL } }, 179 { "anon_inode", { COMMON_FILE_PERMS, NULL } }, 180 { "io_uring", { "override_creds", "sqpoll", "cmd", NULL } }, 181 { "user_namespace", { "create", NULL } }, 182 { NULL } 183 }; 184 185 #ifdef __KERNEL__ /* avoid this check when building host programs */ 186 #include <linux/socket.h> 187 188 #if PF_MAX > 46 189 #error New address family defined, please update secclass_map. 190 #endif 191 #endif 192